SlideShare une entreprise Scribd logo
1  sur  14
(Extent Surveillance Program)
 "Planning Tool for Resource Integration,
Synchronization, and Management," and is
a "data tool" designed to collect and
process "foreign intelligence" that passes
through American servers. Details about its
existence were leaked to The Washington
Post and The Guardian by Edward Snowden,
a 29-year-old NSA contractor.
What is PRISM?
 , "PRISM [is] a kick-ass GUI that allows an
analyst to look at, collate, monitor, and cross-
check different data types provided to the
NSA from Internet companies located inside
the United States.“
What is PRISM? (continuation)
 The first is to emphasize the necessity of the secret
monitoring program. A spokesman
for the U.S. government and other senior officials have
repeatedly defended the
program and tried to claim that the project has helped
the National Security Agency to
detect and foil dozens of terrorist plots. U.S. President
Obama himself has personally
insisted that the project serves only as a counter-
terrorist measure to ensure the safety
of Americans, and he has stated that he is ready to expl
ain the program to European leaders at the G8 summit.
What has the Prism program taught
us?
 The second is to convince both its domestic and its intern
ational audience of thereasonable goals of the Prism prog
ram. The government has cited the Patriot Act tojustify it
s legitimacy, and has asserted that protective measures w
ere in place toprevent monitored data from being abused
. It has tried to distinguish the Prism secretsurveillance pr
oject from so-
called "Chinese cyber attacks", claiming that there is nore
semblance between the two. According to the US accoun
t the purpose of the formeris "to monitor and track peopl
e who want to do evil", while the latter equates to "China
stealing commercial and military secrets”.
What has the Prism program taught
us?
 The third is an intention to eventually extradite
Snowden and bring him back to America
to stand trial. In the eyes of American officials,
Snowden’s disclosures concerning the
confidential Prism program represent a serious
breach of American law. The U.S. Has
not yet cited the judiciary assistance agreemen
t with Hong Kong as a means to
extradite Snowden. But it has been busy makin
g its preparations to this end in terms of
both public opinion and legal grounds.
What has the Prism program taught
us?
 PRISM "cannot be used to intentionally
target any U.S. citizen (PDF), or any other
U.S. person, or to intentionally target any
person known to be in the United States,
according to a statement released by
Director Clapper on June 8.
It only targets foreigners?
 A huge amount of foreign internet traffic is
routed through or saved on U.S. servers. For
instance, a majority of Facebook and Google
users are not from the United States.
Why would there be foreign
intelligence on American servers?
 The key word is intentional. The NSA can't
intentionally target an Americans data. But
analysts need only be at least 51 percent
confident of a target's "foreignness."
So how does this affect an
American's data?
 Microsoft, Yahoo, AOL, Facebook, Google, Apple,
PalTalk, YouTube, and Skype. Dropbox is allegedly
"coming soon." However, 98 percent of PRISM
production is based on just Yahoo, Google, and
Microsoft.
 All nine of them have explicitly denied that the
government has "direct access" to their servers.
Reliable sources have confirmed to CNET that
PRISM works on a request-by-request basis, rather
than unfettered access, as was originally reported
by the Washington Post. Here is a direct quote
from our in-depth article on this issue:
Which companies are involved?
 It's not entirely clear, but according to the New York Times, in at least
two cases the companies discussed creating secure digital dropboxes
where information sought by the NSA could be electronically
deposited. Facebook reportedly actually built such a system.
 On Tuesday, June 11, Google published a letter to the Justice
Department, asking for permission to disclose the mechanism by
which FISA requests are completed. A Facebook spokesperson joined
the call, announcing that Facebook would "welcome the opportunity
to provide a transparency report that allows us to share with those
who use Facebook around the world a complete picture of the
government requests we receive, and how we respond." After writing
the letter to the Justice Department, Google discussed with Wired
Magazine the ways it gets legal information to the government,
insisting throughout that reports of "direct access" to Google servers
have been erroneous. Jump to our How does it work? section for
more details.
How?
 That's a very good question that at first no one was able to
answer.
 It now appears as though the answer is: Twitter simply said no.
 Companies are legally obligated to comply with any legitimate
government request for user data, but they are under no legal
obligation to make that process easier. Twitter
apparently refused to join the other nine in steam rolling the
process.
 On Friday, June 7, the New York Times wrote:
 Twitter declined to make it easier for the government. But
other companies were more compliant, according to people
briefed on the negotiations. They opened discussions with
national security officials about developing technical methods
to more efficiently and securely share the personal data of
foreign users in response to lawful government requests. And
in some cases, they changed their computer systems to do so.
Why isn't Twitter a part of
PRISM?
 According to "slides and other supporting materials" given to
the The Guardian and The Washington Post by Snowden: "e-
mail, chat, videos, photos, stored data, VoIP, file transfers,
video conferencing, notifications of target activity...log-ins, etc.,
online social networking details" -- so, everything.
 For instance, Google data includes "Gmail, voice and video
chat, Google Drive files, photo libraries, and live surveillance of
search terms."
 The original report suggests that "NSA reporting increasingly
relies on PRISM" as its leading source of raw material,
accounting for nearly one in seven intelligence reports.
 A reliable source tells CNET that both the contents of
communications and metadata, such as information about
who's talking to whom, can be requested.
What type of data is monitored?
 Yes, under Section 702 of the Foreign Intelligence Surveillance
Act (FISA) of 2008 and the Protect America Act of 2007.
Director of National Intelligence James Clapper released a
statement Thursday night saying that "Section 702 is a
provision of FISA that is designed to facilitate the acquisition of
foreign intelligence information concerning non-U.S. persons
located outside the United States. It cannot be used to
intentionally target any U.S. citizen, any other U.S. person, or
anyone located within the United States." FISA was renewed
last year by Congress.
 According to the Post, "Late last year, when critics in Congress
sought changes in the FISA Amendments Act, the only
lawmakers who knew about PRISM were bound by oaths of
office to hold their tongues." When the story broke, Ron
Wyden (D-Ore.) and Mark Udall (D-Colo.) released a letter they
cowrote to the Justice Department expressing their concerns
relating to the program.
Is it even legal?

Contenu connexe

Tendances

The Security Era
The Security EraThe Security Era
The Security Era
jk_welder
 
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Dick Pirozzolo, APR
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Hacker organizations
Hacker organizationsHacker organizations
Hacker organizations
MarioEliseo3
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
MarioEliseo3
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
Muhammed Haidri
 

Tendances (19)

Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Comey Exposes Political Scandal of Watergate Calibre
Comey Exposes Political Scandal of Watergate CalibreComey Exposes Political Scandal of Watergate Calibre
Comey Exposes Political Scandal of Watergate Calibre
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
National Post Humber News
National Post Humber NewsNational Post Humber News
National Post Humber News
 
The FBI hand behind Russia-gate
The FBI hand behind Russia-gateThe FBI hand behind Russia-gate
The FBI hand behind Russia-gate
 
With a license to kill with drones
With a license to kill with dronesWith a license to kill with drones
With a license to kill with drones
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
Polinter09
Polinter09Polinter09
Polinter09
 
Hacker organizations
Hacker organizationsHacker organizations
Hacker organizations
 
Haaretz
HaaretzHaaretz
Haaretz
 
HACKTIVISM
HACKTIVISMHACKTIVISM
HACKTIVISM
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Student Presentation Assignment
Student Presentation AssignmentStudent Presentation Assignment
Student Presentation Assignment
 

Similaire à Prism

Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
Jun Hao Lim
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
elishaoatway
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
LeonardN9WWelchw
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna
 

Similaire à Prism (20)

Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
Q&A about PRISM
Q&A about PRISMQ&A about PRISM
Q&A about PRISM
 
Intelligence chief defends internet spying program
Intelligence chief defends internet spying programIntelligence chief defends internet spying program
Intelligence chief defends internet spying program
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Gmail Hacking in China
Gmail Hacking in ChinaGmail Hacking in China
Gmail Hacking in China
 
How America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mobHow America’s surveillance networks helped the FBI catch the Capitol mob
How America’s surveillance networks helped the FBI catch the Capitol mob
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
Academic project used marketing data to monitor russian military sites
Academic project used marketing data  to monitor russian military sites Academic project used marketing data  to monitor russian military sites
Academic project used marketing data to monitor russian military sites
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Anger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelationsAnger swells after NSA phone records collection revelations
Anger swells after NSA phone records collection revelations
 
Lawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't workLawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't work
 
Lawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't workLawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't work
 

Dernier

{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
Diya Sharma
 

Dernier (20)

Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 

Prism

  • 2.  "Planning Tool for Resource Integration, Synchronization, and Management," and is a "data tool" designed to collect and process "foreign intelligence" that passes through American servers. Details about its existence were leaked to The Washington Post and The Guardian by Edward Snowden, a 29-year-old NSA contractor. What is PRISM?
  • 3.  , "PRISM [is] a kick-ass GUI that allows an analyst to look at, collate, monitor, and cross- check different data types provided to the NSA from Internet companies located inside the United States.“ What is PRISM? (continuation)
  • 4.  The first is to emphasize the necessity of the secret monitoring program. A spokesman for the U.S. government and other senior officials have repeatedly defended the program and tried to claim that the project has helped the National Security Agency to detect and foil dozens of terrorist plots. U.S. President Obama himself has personally insisted that the project serves only as a counter- terrorist measure to ensure the safety of Americans, and he has stated that he is ready to expl ain the program to European leaders at the G8 summit. What has the Prism program taught us?
  • 5.  The second is to convince both its domestic and its intern ational audience of thereasonable goals of the Prism prog ram. The government has cited the Patriot Act tojustify it s legitimacy, and has asserted that protective measures w ere in place toprevent monitored data from being abused . It has tried to distinguish the Prism secretsurveillance pr oject from so- called "Chinese cyber attacks", claiming that there is nore semblance between the two. According to the US accoun t the purpose of the formeris "to monitor and track peopl e who want to do evil", while the latter equates to "China stealing commercial and military secrets”. What has the Prism program taught us?
  • 6.  The third is an intention to eventually extradite Snowden and bring him back to America to stand trial. In the eyes of American officials, Snowden’s disclosures concerning the confidential Prism program represent a serious breach of American law. The U.S. Has not yet cited the judiciary assistance agreemen t with Hong Kong as a means to extradite Snowden. But it has been busy makin g its preparations to this end in terms of both public opinion and legal grounds. What has the Prism program taught us?
  • 7.  PRISM "cannot be used to intentionally target any U.S. citizen (PDF), or any other U.S. person, or to intentionally target any person known to be in the United States, according to a statement released by Director Clapper on June 8. It only targets foreigners?
  • 8.  A huge amount of foreign internet traffic is routed through or saved on U.S. servers. For instance, a majority of Facebook and Google users are not from the United States. Why would there be foreign intelligence on American servers?
  • 9.  The key word is intentional. The NSA can't intentionally target an Americans data. But analysts need only be at least 51 percent confident of a target's "foreignness." So how does this affect an American's data?
  • 10.  Microsoft, Yahoo, AOL, Facebook, Google, Apple, PalTalk, YouTube, and Skype. Dropbox is allegedly "coming soon." However, 98 percent of PRISM production is based on just Yahoo, Google, and Microsoft.  All nine of them have explicitly denied that the government has "direct access" to their servers. Reliable sources have confirmed to CNET that PRISM works on a request-by-request basis, rather than unfettered access, as was originally reported by the Washington Post. Here is a direct quote from our in-depth article on this issue: Which companies are involved?
  • 11.  It's not entirely clear, but according to the New York Times, in at least two cases the companies discussed creating secure digital dropboxes where information sought by the NSA could be electronically deposited. Facebook reportedly actually built such a system.  On Tuesday, June 11, Google published a letter to the Justice Department, asking for permission to disclose the mechanism by which FISA requests are completed. A Facebook spokesperson joined the call, announcing that Facebook would "welcome the opportunity to provide a transparency report that allows us to share with those who use Facebook around the world a complete picture of the government requests we receive, and how we respond." After writing the letter to the Justice Department, Google discussed with Wired Magazine the ways it gets legal information to the government, insisting throughout that reports of "direct access" to Google servers have been erroneous. Jump to our How does it work? section for more details. How?
  • 12.  That's a very good question that at first no one was able to answer.  It now appears as though the answer is: Twitter simply said no.  Companies are legally obligated to comply with any legitimate government request for user data, but they are under no legal obligation to make that process easier. Twitter apparently refused to join the other nine in steam rolling the process.  On Friday, June 7, the New York Times wrote:  Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations. They opened discussions with national security officials about developing technical methods to more efficiently and securely share the personal data of foreign users in response to lawful government requests. And in some cases, they changed their computer systems to do so. Why isn't Twitter a part of PRISM?
  • 13.  According to "slides and other supporting materials" given to the The Guardian and The Washington Post by Snowden: "e- mail, chat, videos, photos, stored data, VoIP, file transfers, video conferencing, notifications of target activity...log-ins, etc., online social networking details" -- so, everything.  For instance, Google data includes "Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms."  The original report suggests that "NSA reporting increasingly relies on PRISM" as its leading source of raw material, accounting for nearly one in seven intelligence reports.  A reliable source tells CNET that both the contents of communications and metadata, such as information about who's talking to whom, can be requested. What type of data is monitored?
  • 14.  Yes, under Section 702 of the Foreign Intelligence Surveillance Act (FISA) of 2008 and the Protect America Act of 2007. Director of National Intelligence James Clapper released a statement Thursday night saying that "Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States." FISA was renewed last year by Congress.  According to the Post, "Late last year, when critics in Congress sought changes in the FISA Amendments Act, the only lawmakers who knew about PRISM were bound by oaths of office to hold their tongues." When the story broke, Ron Wyden (D-Ore.) and Mark Udall (D-Colo.) released a letter they cowrote to the Justice Department expressing their concerns relating to the program. Is it even legal?